Scheduling method and device for operating network element database
A scheduling method and database technology, applied in structured data retrieval, special data processing applications, etc., can solve the problems of lost instructions and data, increase network overhead, affect network operation efficiency, etc., to eliminate lost instructions and data, increase network Overhead, the effect of reducing the time to create a new session
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0112] This embodiment is a scheduling method for locking the operation configuration database of a network element. In this embodiment, each configuration protocol session executes the NETCONF protocol and belongs to the same type of configuration protocol session. Therefore, the network element only needs to operate according to the target of each controller Priority determines the operation priority. For the sake of brevity, the operation priority is referred to as priority for short.
[0113] Figure 4 It is a schematic diagram of the implementation flow of the scheduling method for locking the operation configuration database of the network element according to the embodiment of the present invention, as shown in Figure 4 As shown, the process includes:
[0114] Step 401: Network element 1 notifies controller 1, controller 2, and controller 3 that it supports priority-based preemptive locking;
[0115] In this embodiment, the controller 1, the controller 2, ...
Embodiment 2
[0130] This embodiment is a scheduling method for locking candidate configuration databases of network elements. In this embodiment, the configuration protocol sessions executed by the controller 4 are of different types; Configure the operational priority for protocol sessions. For the sake of brevity, the operation priority is referred to as priority for short.
[0131] Figure 5 It is a schematic diagram of the implementation flow of the scheduling method for locking the candidate configuration database of the network element according to Embodiment 2 of the present invention, as shown in Figure 5 As shown, the process includes:
[0132] Step 501: The network element 2 notifies the controller 4, the controller 5, and the controller 6 that it supports priority-based preemptive locking;
[0133] Here, the controller 4, the controller 5, and the controller 6 are all configuration applications of the peer end of the configuration protocol session, and are generall...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


